Home icon Chevron Categories Chevron Blog Chevron News Chevron

HPE Issues Critical Security Fixes for StoreOnce Backup Systems

HPE Issues Critical Security Fixes for StoreOnce Backup Systems

June 04, 2025


Hewlett Packard Enterprise (HPE) has rolled out urgent security patches to fix eight separate vulnerabilities in its StoreOnce data backup and deduplication platform. These flaws, if left unaddressed, could enable attackers to bypass authentication measures and execute remote code on affected systems.

According to HPE’s official advisory, the vulnerabilities open the door to various attack vectors, including remote code execution (RCE), information leakage, server-side request forgery (SSRF), unauthorized access, file deletion, and directory traversal attacks.

One of the most serious issues, tracked as CVE-2025-37093, holds a critical severity rating of 9.8 on the CVSS scale. This flaw, found in all versions prior to 4.3.11, allows attackers to bypass authentication entirely. Reported on October 31, 2024, the bug was discovered by an anonymous researcher and shared via the Zero Day Initiative (ZDI).

ZDI explained the root of the vulnerability lies in a faulty implementation of the machineAccountCheck method, which fails to correctly validate authentication. If exploited, it can be used by remote attackers to gain unauthorized access and potentially chain with other vulnerabilities to perform further malicious actions like executing code, stealing data, or deleting files — all with root-level privileges.

The list of addressed vulnerabilities includes:

  • CVE-2025-37089 – Remote Code Execution

  • CVE-2025-37090 – Server-Side Request Forgery

  • CVE-2025-37091 – Remote Code Execution

  • CVE-2025-37092 – Remote Code Execution

  • CVE-2025-37093 – Authentication Bypass

  • CVE-2025-37094 – Arbitrary File Deletion via Directory Traversal

  • CVE-2025-37095 – Information Disclosure via Directory Traversal

  • CVE-2025-37096 – Remote Code Execution

In addition, HPE also released updates for other critical vulnerabilities in its Telco Service Orchestrator (CVE-2025-31651) and OneView management software (CVE-2024-38475 and CVE-2024-38476), both scoring 9.8, stemming from previously known issues in Apache Tomcat and Apache HTTP Server components.

At present, no signs of active exploitation have been reported. However, HPE strongly advises all users to apply the latest security updates as soon as possible to minimise risk.

Stay alert, and keep your security measures updated!

Source: Follow cybersecurity88 on X and LinkedIn for the latest cybersecurity news


Did you like the post? Share it in your media

Latest Articles

Featured

ISO-Based Malware Campaign Spreads RATs and Crypto Miners Through Fake Software Installers

April 02, 2026 · Chetna Sehgal

A new cyber campaign has been discovered where attackers are using fake software downloads to spr...

Read More >
Featured

Casbaneiro Banking Trojan Spreads Across Latin America Using Worm-Like Phishing Attacks

April 02, 2026 · Chetna Sehgal

A dangerous banking malware called Casbaneiro is currently spreading across Latin America and tar...

Read More >
Featured

Google Fixes Fourth Chrome Zero-Day Exploited in Active Attacks in 2026

April 01, 2026 · Chetna Sehgal

In a major cybersecurity update, Google has fixed multiple zero-day vulnerabilities in its Chrome...

Read More >
Featured

Claude Code Source Leak: Anthropic Confirms npm Packaging Error Exposed 500K+ Lines of Code

April 01, 2026 · Chetna Sehgal

In a recent incident that gained major attention in the tech world, Anthropic confirmed that part...

Read More >
Featured

Axios Supply Chain Attack Exposes Developers to Cross-Platform RAT via Compromised npm Account

March 31, 2026 · Chetna Sehgal

A serious cybersecurity issue has recently come up involving Axios, which is a very popular JavaS...

Read More >
Featured

Hacker Charged in $53 Million Uranium Finance Crypto Heist Linked to Smart Contract Exploit

March 31, 2026 · Chetna Sehgal

A major case of cryptocurrency theft has recently come into the spotlight, where a hacker has bee...

Read More >
Newsletter line